Product Details

1of 9

Bug Bounty: Web Hacking

Get Paid to Legally Hack The World's Biggest Web Apps

Did you know you can make money identifying and fixing bugs on some of the biggest web apps on earth? Last year, Facebook paid $5 million to independent hackers while Google paid over $6 million as part of their bug bounty programs. And they're far from alone. In this course, you'll learn how to legally hack major companies like Facebook, Google, and PayPal and get paid to do it.

Access 72 lectures & 5.5 hours of content 24/7

Learn how to get paid for hacking & disclosing bugs to major companies

Get familiar w/ Burp Suite, browser plugins, & Kali Linux

Explore types of vulnerability such as SQL, XSS, CSRF injection, & more

Discover the methodology for performing bug bounty

Amit Huddar is an Internet Entrepreneur and Software Engineer. He runs his own software company "Softdust," which develops products for new technologies like wearables and other gadgets. He opted for computer science engineering in 2013 at SSIT and started his software company in his first year of engineering.

CompTIA Security + Exam Preparation

Study to Pass the CompTIA Security+ Certification Exam

This course is targeted towards aspiring information security professionals who aren't sure where to start. Beginning with basic security fundamentals, this course elevates through more advanced topics, ultimately providing you with the knowledge you need to pass the globally-recognized CompTIA Security+ certification exam.

Access 67 lectures & 10.5 hours of content 24/7

Cover basic security fundamentals, threats, & vulnerabilities

Explore network security

Dive into host & application security

Discuss risk management & business continuity planning

Study to ace the CompTIA Security+ certification exam on the first attempt

Mohamed Atef is an ICT Consultant, Senior Penetration tester and certified instructor with more than 20 years of experience in professional and academic courses and 2 books published.

Ethical Hacking Using Kali Linux From A to Z

Discover the Power of Kali Linux, One of the Most Popular Ethical Hacking Tools

To break into the world of professional penetration testing, you'll need to be an ace with Kali Linux. This course will introduce you to the latest ethical hacking tools and techniques with Kali Linux, using a testing lab for practicing different types of attacks. Across the course, you'll simulate an entire penetration test from beginning to end, giving you verifiable hands-on experience.

Access 80 lectures & 8.5 hours of content 24/7

Get comfortable w/ Kali Linux & learn the penetration testing phases

Manage Kali Linux HTTP & SSH services

Discover essential tools like Netcat & WireShark

Gather passive & active information

Explore how to perform & defend against a variety of attacks

Receive monthly virtual machines as a hacking challenge

Mohamed Atef is an ICT Consultant, Senior Penetration tester and certified instructor with more than 20 years of experience in professional and academic courses and 2 books published.

Ethical Hacking From Scratch to Advanced Techniques

Get Paid to Hack Computer Networks When You Become a Certified Ethical Hacker

You hear about it all the time: companies getting hacked, having their websites shut down or their customers' data compromised. When that happens, it's time to call in ethical hackers to break into network systems, evaluate their security, and propose solutions. After this course you'll be well on your way to being one of these hackers, paid generously to hack networks, apps, emails, social media accounts, and more!

Access 89 lectures & 16 hours of content 24/7

Understand how to bypass different security layers after getting proper approval

Learn Social Engineering From Scratch

Hack Into Secure Systems & Protect Yourself From Hackers

In this course you'll start with the basics of social engineering and elevate to an advanced enough level to be able to hack into all major operating systems, generate different types of Trojans, and deliver them using smart social engineering practices. Focused on the practical side of penetration testing, you'll first set up a lab before getting real practice with penetration testing that will help you build a career and protect yourself from malicious hacking.

Zaid Al-Quraishi is an ethical hacker, pentester, and programmer. He has extensive experience in ethical hacking and penetration testing, more specifically with regard to network security. Zaid started making video tutorials in 2009 for the ethical hacking website iSecuri1ty, and has also served as an editor, manager, and penetration tester for the company. He teaches mostly by example, specifically by first explaining the theory of each technique and then how it translates to a real-life situation.

Learn Website Hacking and Penetration Testing From Scratch

Learn How to Hack Sites Like A Black Hat Hacker & How to Protect Them Like A White Hat Hacker

This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. As you gain a complex understanding of websites, you will then learn how you can exploit them to carry out a number of powerful cyber attacks. You'll track from a beginning to advanced level and by the time you finish you'll be able to launch attacks and test the security of websites and apps the same way that black hat hackers would, and be able to fix these vulnerabilities.

Access 93 lectures & 9 hours of content 24/7

Learn how to gather information about your target site like discovering the DNS server used & subdomains

Discover, exploit, & fix a number of vulnerabilities like file upload, code execution, SQL injection, XSS, & much more

Understand what you can do w/ the access gained from vulnerabilities

Explore the basic exploitation of attacks & the advanced methods to enhance them

Learn how & why vulnerabilities are exploitable, how to fix them, & the right practices to avoid them

Zaid Al-Quraishi is an ethical hacker, pentester, and programmer. He has extensive experience in ethical hacking and penetration testing, more specifically with regard to network security. Zaid started making video tutorials in 2009 for the ethical hacking website iSecuri1ty, and has also served as an editor, manager, and penetration tester for the company. He teaches mostly by example, specifically by first explaining the theory of each technique and then how it translates to a real-life situation.

Hands on, Interactive Penetration Testing & Ethical Hacking

This course allows you to follow, in real time, each stage of a penetration testing engagement so you cna tweak and train your skills over and over again. You'll get the latest tools and techniques using Rapid 7's tool Metasploit to exploit targets, as well as run post exploitation techniques and utilize PowerShell with Empire. By giving you interactive, hands-on experience, you'll be able to learn more efficiently and build a lucrative career as a penetration tester.

Access 23 lectures & 3 hours of content 24/7

Understand how to move around Metasploit

Learn how to not be seen by intrusion detection system & evade anti-virus software used by professional penetration testers

Explore Empire, how to gain sessions known as "agents," escalate privileges & migrate over to the Metasploit framework

Discover penetration tactics in real-time through visual learning

Nick Smith has substantial experience in Networking & Systems Management covering Windows, *nix & Mac. He has worked from the ground up as a Systems Administrator / Network Administrator, ISP, Provisioning Broadband services & MPLS Networks in large corporate environments. He has been involved in running penetration test engagements within the Financial Sector Services for some of the largest global banking Institutes. Nick currently holds the Qualys Vulnerability Assessor Certification, & will explore CREST and others when he has time in the future.

Details & Requirements

Length of time users can access this course: lifetime

Access options: web streaming, mobile streaming

Certification of completion not included

Redemption deadline: redeem your code within 30 days of purchase

Experience level required: all levels

Compatibility

Internet required

Course Outline

Learn Metasploit

Navigation around the Console, Shortcut Keys, Searching and Time Saving Key Tips (14:34)

Complete WiFi and Network Ethical Hacking Course 2017

Learn to Break & Secure WiFi Networks

This course will give you an in-depth look into WiFi hacking and security. By course's end, regardless of experience, you'll be confident breaking all types of WiFi encryption methods and be ready to start pursuing a career in network security.

Access 21 lectures & 3 hours of content 24/7

Learn how to properly prepare your working environment

Explore some basics about networks & how they work

Discover every possible attack you can perform on a target network without being connected to it

Crack & bypass security mechanisms of a network

Understand how to anonymously stay on the network without being noticed

Reduce the risk of being hacked by learning to secure your network

LearnPentest is a group of penetration testers and ethical hackers with an extensive background in web application security, web and software development, network administration and exploit development. They have over 7 years of professional experience in the cyber security domain. Their instructors hold some of the most valuable certifications in the cyber security domain including: OSCP, LPT, C|EH, CISSP, OSCE.

Cyber Security Volume I: Hackers Exposed

Internet security has never been as important as it is today with more information than ever being handled digitally around the globe. In the first course of this four volume bundle, you'll get an introduction to hacking and how to protect yourself and others. You'll develop an understanding of the threat and vulnerability landscape through threat modeling and risk assessments, and build a foundation for which to expand your security knowledge.

Nathan House has over 24 years experience in cyber security where he has advised some of largest companies in the world, assuring security on multi-million and multi-billion pound projects. He is CEO of Station X, a cyber security consultancy. More recently Nathan acted as the lead security consultant on a number of the UK's mobile banking and payment solutions helping secure to date over £71Bn in transactions.

Over the years he has spoken at a number of security conferences, developed free security tools, and discovered serious security vulnerabilities in leading applications. Nathan's qualifications and education include: